GollmannThird European Symposium on Research in Computer Security, Brighton, United Kingdom, November 7 - 9, 1994. Proceedings
Computer Security - ESORICS 94
Third European Symposium on Research in Computer Security, Brighton, United Kingdom, November 7 - 9, 1994. Proceedings
Mitarbeit:Gollmann, Dieter
GollmannThird European Symposium on Research in Computer Security, Brighton, United Kingdom, November 7 - 9, 1994. Proceedings
Computer Security - ESORICS 94
Third European Symposium on Research in Computer Security, Brighton, United Kingdom, November 7 - 9, 1994. Proceedings
Mitarbeit:Gollmann, Dieter
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This volume constitutes the proceedings of the Third European Symposium on Research in Computer Security, held in Brighton, UK in November 1994. The 26 papers presented in the book in revised versions were carefully selected from a total of 79 submissions; they cover many current aspects of computer security research and advanced applications. The papers are grouped in sections on high security assurance software, key management, authentication, digital payment, distributed systems, access control, databases, and measures.
Andere Kunden interessierten sich auch für
- Pierangela Samarati / Peter Ryan / Dieter Gollmann / Refik Molva (eds.)Computer Security - ESORICS 200439,99 €
- Einar Snekkenes / Dieter Gollmann (eds.)Computer Security - ESORICS 200339,99 €
- Eugene Asarin / Dieter Gollmann / Jan Meier / Andrei SabelfeldComputer Security - ESORICS 200677,99 €
- BertinoComputer Security - ESORICS 9639,99 €
- Joachim Biskup (Volume ed.) / Javier LopezComputer Security - ESORICS 200775,99 €
- QuisquaterComputer Security - ESORICS 9839,99 €
- Computer Security - ESORICS 201638,99 €
-
-
-
This volume constitutes the proceedings of the Third European Symposium on Research in Computer Security, held in Brighton, UK in November 1994.
The 26 papers presented in the book in revised versions were carefully selected from a total of 79 submissions; they cover many current aspects of computer security research and advanced applications. The papers are grouped in sections on high security assurance software, key management, authentication, digital payment, distributed systems, access control, databases, and measures.
The 26 papers presented in the book in revised versions were carefully selected from a total of 79 submissions; they cover many current aspects of computer security research and advanced applications. The papers are grouped in sections on high security assurance software, key management, authentication, digital payment, distributed systems, access control, databases, and measures.
Produktdetails
- Produktdetails
- Lecture Notes in Computer Science 875
- Verlag: Springer / Springer Berlin Heidelberg / Springer, Berlin
- Artikelnr. des Verlages: 978-3-540-58618-0
- 1994.
- Seitenzahl: 488
- Erscheinungstermin: 19. Oktober 1994
- Englisch
- Abmessung: 235mm x 155mm x 27mm
- Gewicht: 628g
- ISBN-13: 9783540586180
- ISBN-10: 3540586180
- Artikelnr.: 09251838
- Herstellerkennzeichnung
- Springer-Verlag GmbH
- Tiergartenstr. 17
- 69121 Heidelberg
- ProductSafety@springernature.com
- Lecture Notes in Computer Science 875
- Verlag: Springer / Springer Berlin Heidelberg / Springer, Berlin
- Artikelnr. des Verlages: 978-3-540-58618-0
- 1994.
- Seitenzahl: 488
- Erscheinungstermin: 19. Oktober 1994
- Englisch
- Abmessung: 235mm x 155mm x 27mm
- Gewicht: 628g
- ISBN-13: 9783540586180
- ISBN-10: 3540586180
- Artikelnr.: 09251838
- Herstellerkennzeichnung
- Springer-Verlag GmbH
- Tiergartenstr. 17
- 69121 Heidelberg
- ProductSafety@springernature.com
Valuation of trust in open networks.- Security versus performance requirements in data communication systems.- Non-interference through determinism.- Compile-time detection of information flow in sequential programs.- Security through type analysis.- Designing secure key exchange protocols.- Robust and secure password and key change method.- Beacon based authentication.- Authentication via multi-service tickets in the Kuperee server.- Oblivious signatures.- A calculus for secure channel establishment in open networks.- On strengthening authentication protocols to foil cryptanalysis.- An efficient electronic payment system protecting privacy.- The ESPRIT project CAFE -High security digital payment systems.- Liability and computer security: Nine principles.- Implementing secure dependencies over a network by designing a distributed security subsystem.- A secure medium access control protocol: Security versus performances.- Distributed file system over a multilevel secure architecture problems and solutions.- On the expressive power of the unary transformation model.- Privilege graph: An extension to the typed access matrix model.- A consideration of the modes of operation for secure systems.- Mark-and-sweep garbage collection in multilevel secure object-oriented database systems.- Decomposition of multilevel objects in an object-oriented database.- Supporting object-based high-assurance write-up in multilevel databases for the replicated architecture.- Aggregation in relational databases: Controlled disclosure of sensitive information.- Information flow controls vs inference controls: An integrated approach.
Valuation of trust in open networks.- Security versus performance requirements in data communication systems.- Non-interference through determinism.- Compile-time detection of information flow in sequential programs.- Security through type analysis.- Designing secure key exchange protocols.- Robust and secure password and key change method.- Beacon based authentication.- Authentication via multi-service tickets in the Kuperee server.- Oblivious signatures.- A calculus for secure channel establishment in open networks.- On strengthening authentication protocols to foil cryptanalysis.- An efficient electronic payment system protecting privacy.- The ESPRIT project CAFE -High security digital payment systems.- Liability and computer security: Nine principles.- Implementing secure dependencies over a network by designing a distributed security subsystem.- A secure medium access control protocol: Security versus performances.- Distributed file system over a multilevel secure architecture problems and solutions.- On the expressive power of the unary transformation model.- Privilege graph: An extension to the typed access matrix model.- A consideration of the modes of operation for secure systems.- Mark-and-sweep garbage collection in multilevel secure object-oriented database systems.- Decomposition of multilevel objects in an object-oriented database.- Supporting object-based high-assurance write-up in multilevel databases for the replicated architecture.- Aggregation in relational databases: Controlled disclosure of sensitive information.- Information flow controls vs inference controls: An integrated approach.